Lottingem.com bombards users with fake verification prompts and intrusive browser notifications that lead to scams, phishing pages, and shady downloads.
Lottingem.com isn’t a traditional virus that infects your system files. Instead, it’s a deceptive website designed to trick you into enabling browser notifications. Once you click “Allow,” the site gains permission to push spam alerts straight to your desktop or mobile device — even when your browser is closed.
According to an analysis published by EnigmaSoft, Lottingem.com relies on aggressive social engineering tactics to manipulate users into granting these permissions. You can read the original report here.
If you’re seeing constant pop-ups, fake virus warnings, or suspicious redirects, Lottingem.com is likely the culprit.
Lottingem.com Adware Summary
| Threat Type | Adware / Rogue Website / Push Notification Scam |
|---|---|
| Detection Names | Riskware.Lottingem, Adware.PushNotification, BrowserNotificationSpam |
| Symptoms | Constant pop-ups, fake security alerts, redirects to scam sites, browser slowdowns |
| Damage & Distribution | Social engineering prompts, malicious ads, redirects from shady websites, bundled adware |
| Danger Level | Medium |
How Lottingem.com Affects Your Browser
Lottingem.com uses fake CAPTCHA-style pages claiming you must “verify you’re not a robot.” The page may also say suspicious traffic has been detected from your network.
The trick? The “Allow” button has nothing to do with verification.
Clicking it enables browser push notifications. Once permission is granted, Lottingem.com immediately begins sending:
- Fake virus infection alerts
- Phony system warnings using recognizable brand logos
- “Your PC is at risk” scare tactics
- Redirect links to phishing pages
- Ads for questionable software and fake updates
These notifications appear in the lower-right corner of Windows, in macOS notification banners, or directly on Android devices. They look legitimate at first glance — and that’s exactly the point.
Where Lottingem.com Comes From
Most people don’t visit Lottingem.com intentionally. Instead, they get redirected there through:
- Clicking ads on torrent, streaming, or adult sites
- Malicious pop-ups on compromised web pages
- Adware already installed on the system
- Fake download buttons
If your browser keeps redirecting automatically, there’s a strong chance unwanted software is running in the background.
Is Lottingem.com a Real Threat?
Lottingem.com won’t encrypt your files or steal data directly like ransomware or a Trojan. But it’s still dangerous.
Here’s why:
- It exposes you to phishing scams that can steal passwords or credit card details.
- It promotes fake tech support schemes designed to extract money.
- It can lead to additional malware downloads.
- It creates constant distractions and reduces browser security.
The longer it stays active, the higher the risk of landing on something far worse.
If you’ve already clicked “Allow,” don’t panic. Remove the notification permissions from your browser settings and run a full system scan to ensure no bundled adware remains.
Manual Adware Removal (Windows & Mac)
Step 1: Identify Suspicious Applications
For Windows Users
- Press
Ctrl + Shift + Escto open the Task Manager. - Check the “Processes” tab for unfamiliar or suspicious programs consuming excessive CPU or memory.
- If you find any, note their names and close them.
- Open
Control Panel>Programs>Programs and Features. - Locate the suspicious application, right-click it, and select “Uninstall.”
For Mac Users
- Open
Finderand navigate toApplications. - Look for any suspicious or unknown applications.
- Drag them to the
Trash, then right-click on theTrashand selectEmpty Trash. - Open
System Preferences>Users & Groups>Login Itemsand remove any unrecognized startup programs.
Step 2: Remove Adware-Related Browser Extensions
Google Chrome
- Open Chrome and go to
Menu(three dots in the top-right corner) >Extensions. - Locate suspicious extensions and click “Remove.”
- Reset Chrome: Go to
Settings>Reset settings> “Restore settings to their original defaults.”
Mozilla Firefox
- Open Firefox and go to
Menu(three lines in the top-right corner) >Add-ons and themes. - Locate and remove suspicious extensions.
- Reset Firefox: Go to
Help>More troubleshooting information> “Refresh Firefox.”
Safari (Mac)
- Open Safari and go to
Preferences>Extensions. - Locate and remove any unknown extensions.
- Reset Safari: Go to
History> “Clear History.”
Microsoft Edge
- Open Edge and go to
Menu(three dots in the top-right corner) >Extensions. - Remove suspicious extensions.
- Reset Edge: Go to
Settings>Reset settings> “Restore settings to their default values.”
Step 3: Delete Adware-Related Files and Folders
For Windows Users
- Press
Win + R, type%AppData%, and press Enter. - Look for suspicious folders and delete them.
- Repeat for
%LocalAppData%,%ProgramData%, and%Temp%.
For Mac Users
- Open Finder, press
Shift + Command + G, and enter~/Library/Application Support/. - Locate and delete suspicious folders.
- Repeat for
~/Library/LaunchAgents/,~/Library/LaunchDaemons/, and~/Library/Preferences/.
Step 4: Flush DNS Cache (Recommended)
For Windows Users
- Open
Command Promptas Administrator. - Type
ipconfig /flushdnsand press Enter.
For Mac Users
- Open
Terminal. - Type
sudo killall -HUP mDNSResponderand press Enter.
Step 5: Restart Your Computer
Restart your device to complete the manual removal process.
Automatic Adware Removal Using SpyHunter (Windows & Mac)
For a hassle-free and effective removal, use SpyHunter, a robust anti-malware tool designed to detect and remove adware efficiently.
Step 1: Download SpyHunter
Download SpyHunter from the official website: Click here to download SpyHunter.
Step 2: Install SpyHunter
Follow the installation instructions based on your operating system:
For Windows Users:
- Open the downloaded
.exefile. - Follow the on-screen installation instructions.
- Launch SpyHunter and allow it to update its malware definitions.
For Mac Users:
- Open the downloaded
.dmgfile. - Drag and drop SpyHunter into the Applications folder.
- Launch SpyHunter and allow it to update its malware definitions.
Step 3: Perform a System Scan
- Open SpyHunter.
- Click on
Start Scan. - Wait for the scan to complete.
- Review the detected threats and click
Fix Threatsto remove adware.
Step 4: Restart Your Device
After SpyHunter removes the threats, restart your computer to finalize the process.
For the most secure and effective removal, we recommend downloading and using SpyHunter: Download SpyHunter Here.
Stay safe and keep your system clean!
Conclusion
Lottingem.com is a browser-based push notification scam that uses fake verification prompts to flood your device with malicious advertisements. While it’s not a file-infecting virus, it opens the door to scams, phishing attacks, and potentially more serious infections.
Remove the notification permissions immediately, clear suspicious extensions, and scan your system with a trusted anti-malware tool to stay protected.
